1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Margarita [4]
2 years ago
15

which of the following is acomputer program that detects, prevents. and takes action sto deactivate or remove malicious programm

sd
Computers and Technology
1 answer:
Len [333]2 years ago
8 0

Answer:

antivirus software is the answer to prevent computer from malicious program

You might be interested in
Which of the below statements describes the purpose of HTML 5 - check as many as apply
rewona [7]

Answer: 2) To provide instruction for how the structure     should look

              4) To provide instruction for how the content should look

Explanation:

HTML 5 is a hypertext markup language revision which basically provide the structure and content to the page. It is a standard programming which basically describe the content of the web page. It reduce the overall development time and it is faster.

In the remaining option, It does not provide any meaning as we cannot add structure directly we should use the CSS styling for the particular document.

Therefore, (2) and (4) option are correct.

4 0
3 years ago
What attack cracks a password or encryption key by trying all possible valid combinations from a defined set of possibilities (a
ss7ja [257]

Answer:

Brute Force attack.

Explanation:

A network is a platform where end user devices like computers are connected to communicate and share resources. There are public networks and private networks.

A public network has its end devices and servers configured with a public IP address, which is routable on the internet, while private networks uses private IP addresses which can be used on the internet.

Private networks can be made accessable to public users by configuring an authentication and authorization policy, which could be one or a multi factor authentication. These requires a password and other factors to access the services of a private network.

An attacker can easily access a one factor or a password accessible user account, if the password is weak by using the process called a brute Force attack.

The brute Force attack exploits the vulnerability of weak passwords by entering possible valid combination from a defined set of possibilities.

6 0
4 years ago
When you insert a new slide in a presentation, where is it placed in relation to the existing slides?.
sladkih [1.3K]
Whenever you create a new slide, it appears below the selected slide.

If you have 2 slides and want one in between the two select the first slide and then select new slide.
4 0
2 years ago
In class, we discussed static local variables in C. Answereach question below; if necessary, find and consult a reference on the
alexira [117]

Answer:

(a) scope: function, lifetime: duration of the function

(b) scope: function, lifetime: duration of the program

(c) scope: global (all modules),  lifetime: duration of the program

(d) scope: module (file), lifetime: duration of the program

6 0
4 years ago
The ___________ method returns the length of an array.
MaRussiya [10]

Answer:

A. Append

Explanation:

4 0
3 years ago
Read 2 more answers
Other questions:
  • In the movie evacuees, why were the children evacuated from large cities?
    11·1 answer
  • 12. Noodle Tools is a website that
    8·1 answer
  • As a safe driver, you cannot, __________
    13·1 answer
  • The part of the computer that contains the brain, or central processing unit, is also known as the
    15·1 answer
  • sandra has houseplants sitting on her kitchen windowsill, where it receives a lot of sunlight . what will most likely be the pla
    9·2 answers
  • Which view would you need to use to make
    14·1 answer
  • The characteristics of Computer Graphics<br><br>FUEL YOUR<br>GREATNESS​
    9·1 answer
  • What Fortnite skin is more og?
    5·2 answers
  • 1- pensamiento sistémico<br>2- visión oriental y occidental​
    8·1 answer
  • The data source in the document which has the information common to all documents. True or false 
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!